
Metasploit mailing list archives
Re: msf server behind nat
From: Varga-Perke Balint <vpbalint () gmail com>
Date: Wed, 15 Dec 2010 23:15:21 +0100
Well, I checked the sources and found that the reverse shell handler (lib/msf/core/handler/reverse_tcp.rb) actually registers an option called ReverseListenerBindAddress, that can override the LHOST option. I didn't test this feature, but seems quite simple. Hope this will help someone having problems with NAT.
2010-12-14 15:50 keltezéssel, Matt Gardenghi írta:
/note could be viewed as blog spam as I wrote this piece....http://www.skullsecurity.org/blog/2009/bypassing-av-over-the-internet-with-metasploitMatt On 12/14/2010 9:30 AM, Tod Beardsley wrote:Hi Balint --On Tue, Dec 14, 2010 at 7:47 AM, Varga-Perke Balint<vpbalint () gmail com> wrote:Did I miss some option or should I always run these type of exploits with directnetwork connection?For individual exploits, you can configure LHOST and LPORT, which generally solves the NAT problem. I've been kicking around getting MSF3 UPnP-aware, though -- with something like that, you could just let the framework configure your NAT device for you through UPnP requests (assuming your router supports it), and it would be dealt with automatically. This is the strategy used by some BitTorrent clients. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- msf server behind nat Varga-Perke Balint (Dec 14)
- Re: msf server behind nat Tod Beardsley (Dec 14)
- Re: msf server behind nat Varga-Perke Balint (Dec 14)
- Re: msf server behind nat Matt Gardenghi (Dec 14)
- Re: msf server behind nat Varga-Perke Balint (Dec 15)
- Re: msf server behind nat Tod Beardsley (Dec 14)